Analysis

  • max time kernel
    151s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 17:04

General

  • Target

    f15f83fe041a57ac0c6ef7b35477c4c15a182422122e880052c4e6d6a08ada0e.url

  • Size

    47B

  • MD5

    189360043dbadb7132eef83aae6df830

  • SHA1

    cd026318d1ef4cfbd01786ebf0b46eb508178007

  • SHA256

    f15f83fe041a57ac0c6ef7b35477c4c15a182422122e880052c4e6d6a08ada0e

  • SHA512

    6dbc8916b5a86deb1e457c2bb719a622e7192888a64dcd6cafd3b23fbbcd1a89e75c52e99e0f5eaa5c07ee26fa8f5a9c02841a4e4d55b94af299b7055be61daa

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\f15f83fe041a57ac0c6ef7b35477c4c15a182422122e880052c4e6d6a08ada0e.url
    1⤵
    • Checks whether UAC is enabled
    PID:2024
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:936
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:936 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1004

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\66U3X1E4.txt
    Filesize

    608B

    MD5

    31c2c1d28c8f299654009b2253f92b82

    SHA1

    a1086b24a88f384fe4c8248b42badd791c3c8a95

    SHA256

    ffb35e624d5eb8256bbcce2e48175c88e5390177084bf3bec686cd05c5ca36be

    SHA512

    b5947d43e491cb5471e34b1c5f4a2e0bead702b5793c27e356b5a6bd58db5bde9e9f8c1020e21bed3d4cc3d72ed8927d416f629f23a46a47fd0ff1903bc93912

  • memory/2024-54-0x000007FEFC2E1000-0x000007FEFC2E3000-memory.dmp
    Filesize

    8KB

  • memory/2024-55-0x0000000001BD0000-0x0000000001BE0000-memory.dmp
    Filesize

    64KB